
5-12
C
HAPTER
5: S
YSTEM
C
ONFIGURATION
IP Address: Specifies the IP address or host name of the RADIUS server.
Accounting Port: The RADIUS Accounting server UDP port used for accounting
messages. (Range: 1024-65535; Default: 1813)
Key: A shared text string used to encrypt messages between the access point
and the RADIUS server. Be sure that the same text string is specified on the
RADIUS server. Do not use blank spaces in the string. (Maximum length: 255
characters)
Timeout: Number of seconds the access point waits for a reply from the
RADIUS server before resending a request. (Range: 1-60 seconds; Default: 5)
Retransmit attempts: The number of times the access point tries to resend an
accounting message to the RADIUS server before the accounting process fails.
(Range: 1-30; Default: 3)
Interim update interval: The interval between transmitting accounting updates
to the RADIUS server. (Range: 60-86400; Default: 3600 seconds)
A
UTHENTICATION
Wireless clients can be authenticated for network access by checking their MAC
address against the local database configured on the access point, or by using a
database configured on a central RADIUS server. Alternatively, authentication can
be implemented using the IEEE 802.1X network access control protocol.
A client’s MAC address provides relatively weak user authentication, since MAC
addresses can be easily captured and used by another station to break into the
network. Using 802.1X provides more robust user authentication using user
names and passwords or digital certificates. You can configure the access point to
use both MAC address and 802.1X authentication, with client station MAC
authentication occurring prior to IEEE 802.1X authentication. However, it is better
to choose one or the other, as appropriate.
IEEE 802.1X is a standard framework for network access control that uses a
central RADIUS server for user authentication. This control feature prevents
unauthorized access to the network by requiring an 802.1X client application to
submit user credentials for authentication. The 802.1X standard uses the
Extensible Authentication Protocol (EAP) to pass user credentials (either digital
NOTE:
For the Timeout and Retransmit attempts fields, accept the default values
unless you experience problems connecting to the RADIUS server over the
network.
Содержание 3CRWEASYA73 / WL-575
Страница 18: ...1 10 ...
Страница 93: ...5 45 WDS and Spanning Tree Settings Figure 40 Spanning Tree Protocol ...
Страница 132: ...5 84 CHAPTER 5 SYSTEM CONFIGURATION ...
Страница 319: ...A 3 Reset the bridge s hardware using the console interface web interface or through a power reset ...
Страница 320: ...A 4 ...
Страница 332: ...Glossary 6 ...